A computer program product for passing initiative in a multitasking multiprocessor environment includes a tangible storage medium readable by a processing circuit and storing instructions for execution by the processing circuit for performing a method. The method includes writing a request to process a resource of the environment to an associated resource control block, setting a resource flag in a central bit vector, the resource flag indicating that a request for processing has been received for the resource, and setting a target processor initiative flag in the environment, the target processor initiative flag indicating a pass of initiative to a target processor responsible for the resource.

Patent
   8429662
Priority
Feb 25 2008
Filed
Mar 28 2008
Issued
Apr 23 2013
Expiry
Sep 12 2031
Extension
1263 days
Assg.orig
Entity
Large
0
59
EXPIRED
11. A method for passing initiative in a multitasking multiprocessor environment, the method comprising:
writing a request to process a resource of the environment to an associated resource control block;
setting a resource flag in a central bit vector, the resource flag indicating that the request for processing has been received for the resource;
setting a target processor initiative flag in the environment, the target processor initiative flag monitored by a target processor responsible for the resource and indicating a pass of initiative to the target processor;
clearing the target processor initiative flag;
determining, at the target processor, the resource associated with the resource flag;
processing the request at the target processor; and
subsequent to clearing the target processor initiative flag, setting the processor initiative flag to ensure that any additional tasks associated with the target processor are not skipped.
8. A computer system for passing initiative in a multitasking multiprocessor environment, the system comprising a plurality of processors including a target processor and a central bit vector, the system configured to perform a method comprising:
writing a request to process a resource of the environment to an associated resource control block;
setting a resource flag in the central bit vector, the resource flag indicating that the request for processing has been received for the resource;
setting a target processor initiative flag in the environment, the target processor initiative flag monitored by the target processor responsible for the resource and indicating a pass of initiative to the target processor
clearing the target processor initiative flag;
determining, at the target processor, the resource associated with the resource flag;
processing the request at the target processor; and
subsequent to clearing the target processor initiative flag, setting the processor initiative flag to ensure that any additional tasks associated with the target processor are not skipped.
1. A computer program product for passing initiative in a multitasking multiprocessor environment, the computer program product comprising:
a non-transitory storage medium readable by a processing circuit and storing instructions for execution by the processing circuit for performing a method comprising:
writing a request to process a resource of the environment to an associated resource control block;
setting a resource flag in a central bit vector, the resource flag indicating that the request for processing has been received for the resource;
setting a target processor initiative flag in the environment, the target processor initiative flag monitored by a target processor and indicating a pass of initiative to the target processor responsible for the resource;
clearing the target processor initiative flag;
determining, at the target processor, the resource associated with the resource flag;
processing the request at the target processor; and
subsequent to clearing the target processor initiative flag, setting the processor initiative flag to ensure that any additional tasks associated with the target processor are not skipped.
2. The computer program product of claim 1, wherein the method further comprises:
accessing the associated resource control block to determine a type of the request.
3. The computer program product of claim 1, wherein the method further comprises clearing the resource flag.
4. The computer program product of claim 1, wherein determining the resource includes performing a logical AND operation between a target processor mask associated with the target processor and the central bit vector.
5. The computer program product of claim 4, wherein the logical AND operation results in a vector containing flag values for all resources associated with only the target processor.
6. The computer program product of claim 1, wherein the resource control block includes information pertaining to an associated target processor.
7. The computer program product of claim 1, wherein the central bit vector is a vector containing binary flag values for every resource of the environment.
9. The system of claim 8, wherein the central bit vector is a vector containing binary flag values for every resource of the environment.
10. The system of claim 8, wherein the target processor receives initiative through an associated mask that is configured to provide information pertaining to resources associated with the target processor.
12. The method of claim 11, further comprising:
accessing the associated resource control block to determine a type of the request.
13. The method of claim 11, further comprising clearing the resource flag.
14. The method of claim 11, wherein determining the resource includes performing a logical AND operation between a target processor mask associated with the target processor and the central bit vector.
15. The method of claim 14, wherein the logical AND operation results in a vector containing flag values for all resources associated with only the target processor.
16. The method of claim 11, wherein the resource control block includes information pertaining to an associated target processor.
17. The method of claim 11, wherein the central bit vector is a vector containing binary flag values for every resource of the environment.

Priority based on U.S. Provisional Patent Application Ser. No. 61/031,315, filed Feb. 25, 2008, and entitled “MULTI-TASKING MULTI-PROCESSOR ENVIRONMENTS OVER INFINIBAND” is claimed, the entire contents of which is incorporated by reference in its entirety.

1. Field of Invention

The present disclosure relates generally to multitasking multiprocessor environments, and in particular, to passing initiative in such fully dynamic environments without lock overhead.

2. Description of Background

InfiniBand® Architecture (IBA) is an industry standard architecture for connecting complex systems. Particularly, InfiniBand® (IB), which is a form of System Area Network (SAN), defines a multicast facility that allows a Channel Adapter (CA) to send a packet to a single address and have it delivered to multiple ports. The InfiniBand® Architecture is described in the InfiniBand® standard, which is available at http://www.infinibandta.org, and also hereby incorporated in its entirety by reference.

In a multitasking multiprocessor environment, such as an environment equipped with IBA, there is a need to pass initiative from multiple processors to multiple targets very quickly and efficiently. Using IBA, multiple processing units receive requests across a communications link, and for certain commands or situations, they need to pass those commands to one of several dedicated IO Processors for handling.

Conventionally, this task has been handled by specialized hardware. However, in the case of IBA, there is no such hardware available to address this concern. Proposed solutions to this problem have involved either locking or queues. Each of those approaches carries a performance or complexity penalty. Obtaining locks in a busy system often requires waiting for other tasks to release those locks. This wait time often ties up the processor attempting to obtain the lock, and delays the passing of the lock. Queues often involve some of the same issues as locks in order to guarantee the integrity of the queue.

Furthermore, the dynamic removal of a target IO processor creates a significant problem for the handling of the items previously queued to that processor. In addition, these solutions do not always scale well as the system grows.

An exemplary embodiment includes a computer program product for passing initiative in a multitasking multiprocessor environment. The computer program product includes a tangible storage medium readable by a processing circuit and storing instructions for execution by the processing circuit for performing a method. The method includes writing a request to process a resource of the environment to an associated resource control block, setting a resource flag in a central bit vector, the resource flag indicating that a request for processing has been received for the resource, and setting a target processor initiative flag in the environment, the target processor initiative flag indicating a pass of initiative to a target processor responsible for the resource.

Another exemplary embodiment includes a multitasking multiprocessor environment. The environment includes a plurality of processors configured to process work requests for resources of the environment, a central bit vector containing flags indicative of the work requests, and a plurality of target processors configured to receive initiative based on the central bit vector.

A further exemplary embodiment includes a method for passing initiative in a multitasking multiprocessor environment. The method includes writing a request to process a resource of the environment to an associated resource control block, setting a resource flag in a central bit vector, the resource flag indicating that a request for processing has been received for the resource, and setting a target processor initiative flag in the environment, the target processor initiative flag indicating a pass of initiative to a target processor responsible for the resource.

Other articles of manufacture, apparatuses, and/or methods according to embodiments will be or become apparent to one with skill in the art upon review of the following drawings and detailed description. It is intended that all such additional articles of manufacture, apparatuses, and/or methods be included within this description, be within the scope of the present invention, and be protected by the accompanying claims.

The subject matter which is regarded as the invention is particularly pointed out and distinctly claimed in the claims at the conclusion of the specification. The foregoing and other objects, features, and advantages of the invention are apparent from the following detailed description taken in conjunction with the accompanying drawings in which:

FIG. 1A illustrates an example embodiment of a multitasking multiprocessor Infiniband® system;

FIG. 1B illustrates an example of a multitasking multiprocessor environment;

FIG. 1C illustrates a multitasking multiprocessor environment, according to an example embodiment;

FIG. 1D illustrates a multitasking multiprocessor environment, according to an example embodiment;

FIG. 2 illustrates a multitasking multiprocessor environment, according to an example embodiment;

FIG. 3 illustrates a method for passing initiative in a multitasking multiprocessor environment, according to an example embodiment;

FIG. 4 illustrates a method for passing initiative in a multitasking multiprocessor environment, according to an example embodiment;

FIG. 5 illustrates a multitasking multiprocessor environment implementing an example methodology, according to an example embodiment; and

FIG. 6 illustrates a computer apparatus, according to an example embodiment. The detailed description explains the preferred embodiments of the invention, together with advantages and features, by way of example with reference to the drawings.

Detailed illustrative embodiments are disclosed herein. However, specific functional details disclosed herein are merely representative for purposes of describing example embodiments. Example embodiments may, however, be embodied in many alternate forms and should not be construed as limited to only the embodiments set forth herein.

Accordingly, while example embodiments are capable of various modifications and alternative forms, embodiments thereof are shown by way of example in the drawings and will herein be described in detail. It should be understood, however, that there is no intent to limit example embodiments to the particular forms disclosed, but to the contrary, example embodiments are to cover all modifications, equivalents, and alternatives falling within the scope of this disclosure and the associated claims.

It should be understood that, although the terms first, second, etc. may be used herein to describe various steps or calculations, these steps or calculations should not be limited by these terms. These terms are only used to distinguish one step or calculation from another. For example, a first calculation could be termed a second calculation, and, similarly, a second step could be termed a first step, without departing from the scope of this disclosure. As used herein, the term “and/or” and the “/” symbol includes any and all combinations of one or more of the associated listed items.

As used herein, the singular forms “a”, “an” and “the” are intended to include the plural forms as well, unless the context clearly indicates otherwise. It will be further understood that the terms “comprises”, “comprising”, “includes”, and/or “including”, when used herein, specify the presence of stated features, integers, steps, operations, elements, and/or components, but do not preclude the presence or addition of one or more other features, integers, steps, operations, elements, components, and/or groups thereof. Therefore, the terminology used herein is for the purpose of describing particular embodiments only and is not intended to be limiting of example embodiments.

It should also be noted that in some alternative implementations, the functions/acts noted may occur out of the order noted in the figures. For example, two figures shown in succession may in fact be executed substantially concurrently or may sometimes be executed in the reverse order, depending upon the functionality/acts involved.

Hereinafter, example embodiments of the present invention will be described in detail. An example embodiment of the present invention provides a method of passing initiative in a fully dynamic environment. Technical effects of example embodiments include the ability to pass initiative to target processor(s) without lock overhead. Example embodiments provide a common registry configured to strategize passing of initiative through use of binary masks. Thus, according to example embodiments, specialized hardware typically used for passing initiative may be omitted and communications links may be more effectively used between processors of a multitasking multiprocessor environment, such as, an environment utilizing IBA.

FIG. 1A illustrates an exemplary embodiment of a multitasking multiprocessor Infiniband system 100. The system 100 can include an operating system 105 (e.g., IBM zOS) having a top layer including a relational database 101 a logging facility 102, a locking facility 103 and a cross system coupling facility (XCF). The operating system 105 can further include a multiple virtual storage (MVS) services layer 107 and a message facility layer 108. The system 100 can further include a coupling facility (CF) 110 having a CF structures layer 111, a link subsystem 112 and a message architecture extensions layer 113. In an exemplary embodiment, a transport layer 115 is disposed between and couples the operating system 105 and the CF 110. In an exemplary implementation, the transport layer 115 is supported by Infiniband. FIG. 1B illustrates an example of a multitasking multiprocessor environment. The example shows three mainframes A, B, C connected into a two different Parallel Sysplex environments using the previous generation of coupling transports. zOS A, zOS B and zOS F are all tied together through a Coupling Facility (CF1). zOS C and zOS D are tied together through CF2. Meanwhile zOS E is a stand alone operating system. In this configuration separate channels are connected through separate adapters in the separate frames. It is appreciated that multiple internal channels 116, 117, 118 include separate external connections 120. FIG. 1C illustrates an example of a multitasking multiprocessor environment in accordance with an exemplary embodiment. In this example, multiple internal channels 121, 122, 123 share the same physical connection 125. FIG. 1 D illustrates an example of a multitasking multiprocessor environment 150 in accordance with an exemplary embodiment. The environment 150 can include one or more channels 155, each channel including command/response areas 156, data buffers 157, receive/send queues 158 and adapters 160 for mapping the channels 155 to ports 161 and ultimately communication links 162, for example, as supported by IBA. The channels 155 can further include queue pairs 159 as discussed further herein. The system 150 can further include control code 165 having functions including but not limited to: rendezvous 166, auxiliary queue 167, channel 168, discovery 169 and subnet administrator 170.

Turning to FIG. 2, a simplified block diagram of a multitasking multiprocessor system 200 is illustrated, according to an example embodiment. It is noted that FIG. 2 is a simplified block diagram included to aid in understanding of example embodiments only, and that other components, interconnections, and the like may be included or omitted depending on any particular implementation. Thus, example embodiments should not be limited to only those simplified structures illustrated in FIG. 2. The system 200 of FIG. 2 includes a plurality of processors 201-204 and 210-213. Each processor of the plurality of processors may be a computer processor capable of executing computer instructions, code, etc. For example, a processor of the plurality of processors may be a computer processor configured to execute instructions in accordance with passing initiative to another processor similar to the methodologies described herein.

The system 200 further includes a central bit vector 206. The central bit vector 206 may be a master list of all resources of environment 200 requiring attention where initiative is being passed to a target IO processor (e.g., processors 210, 211, 212, and/or 213). The environment 200 further includes IO processor initiative blocks 205. For example, each processor initiative block of the initiative blocks 205 may correspond to a target processor. According to the simplified structure of FIG. 2, processors 210, 211, 212, and 213 are denoted A, B, C, and D, respectively to denote relationships with corresponding initiative blocks 205. Thus, processor A (210) may correspond to processor initiative block A of initiative blocks 205.

The environment 200 further includes resource control blocks 208. For example, each resource block of the resource control blocks 208 corresponds to a particular resource of the environment 200 which may require work by a target processor. Furthermore, the resource control blocks 208 may contain flags indicating the type of work that is being requested and other details regarding the work required of the target processor.

The environment 200 further includes masks 207. Masks 207 may include binary masks or other logical masks configured to provide the ability to determine a flag value within the bit vector 206. For example, if a logical AND operation is executed between a mask of masks 207 and the bit vector 206, the resulting vector will contain only particular flag values corresponding to binary ‘ones’ of the mask used. According to the simplified structure of FIG. 2, each mask of the masks 207 is denoted with letters A, B, C, or D to reflect its relationship with one of the target processors 210, 211, 212, and 213, respectively.

The environment 200 makes use of flags including a control block flag located in respective control blocks 208, a target processor flag located in respective processor initiative blocks 205, and/or other suitable flags. For example, the control block flag may indicate a type of work being requested. The target processor flag may provide initiative for the target IO processor to check for work. The masks 207 may be used by corresponding target IO processors (e.g., processors 210-213) to determine which resources they are responsible for handling from the central bit vector. The association of resources to target IO processors may be somewhat stable, and may also be modified to correspond with any particular implementation or system state. Modifications of associated resource flags in the central bit vector may be facilitated with a simple compare and swap operation. According to at least one example embodiment, the compare and swap operation may be performed based on the smallest addressable unit for a compare and swap instruction. Hereinafter, methodologies of passing initiative to processors of a multitasking multiprocessor environment are described with reference to FIGS. 3-4.

Turning to FIG. 3, a method 300 of passing initiative in a multitasking multiprocessor environment includes writing a request at block 301. For example, the processor initially handling the operation wishes to pass the request off to a target IO processor that is better suited to handle the next operation. It may write information pertaining to the request to the appropriate resource control block. Furthermore, a resource flag may be set corresponding to the associated resource control block at block 302. For example, a binary flag may be set in a central bit vector of the environment corresponding to the resource. The binary flag may be set using a compare and swap operation. The method 300 further includes setting a processor initiative flag at block 303. For example, target processors of the environment may be configured to monitor processor initiative flags. Upon occurrence of an appropriate flag, initiative may be passed to a target processor of the environment.

Turning to FIG. 4, a method 400 of receiving or handling initiative in a multitasking multiprocessor environment includes clearing a processor initiative flag at block 401. For example, a target processor of the environment may poll a processor initiative flag to determine if initiative is being passed. If the processor determines initiative is being passed, the processor may clear the initiative flag and perform any related tasks requested. The method 400 further includes determining a resource associated with the initiative flag at block 402. For example, the target processor may perform a logical AND operation using an associated binary mask and a central bit vector. The resulting vector includes flags for particular resources belonging, or assigned, to the target processor.

The method 400 further includes accessing the determined resource at block 403. For example, the target processor may read a resource control block for the determined resource to extract information related to a requested task for the resource. The method 400 further includes processing the requested task at block 404. The method further includes clearing the determined resource flag at block 405. For example, as described with reference to block 402, a flag is unveiled using a logical AND operation. This flag is cleared upon processing of the requested task. The method 400 further includes setting the processor initiative flag at block 406. For example, if a resource was processed in block 404, the processor initiative flag may be set to ensure that any additional tasks associated with the processor are not skipped due to the flag being cleared at block 401. Thus, if no resource is determined in block 402, the processor initiative flag remains unset until it is set due to a work request.

Thus, example embodiments of the present invention provide methodologies of passing initiative in multitasking multi-processing environments. The methodologies are facilitated through several structures included within the environment.

Hereinafter, a more detailed description of example structures for passing initiative utilizing a central bit vector and mask is given with reference to FIG. 5. However, this discussion is given by way of example only, and should not be construed as limiting. As illustrated, FIG. 5 provides a more detailed illustration of passing initiative based on the previously described methodologies and the environment 200.

For the purposes of example explanation, a central bit vector 206 may include twenty-four (24) bits representing twenty-four separate resources or resource control blocks 208 of a multitasking multiprocessor environment. There may be more or less bits depending upon any particular implementation. In at least one example implementation, a bit which is ‘set’ (i.e., given a logical value of one) may indicate that the corresponding resource has a pending request for a target processor.

An example central bit vector and masks are provided in Table 1, below:

TABLE 1
BIT VECTOR
RESOURCE 0 1 2 3 4 5 6 7 8 9 A B C D E F 10 11 12 13 14 15 16 17
FLAG 0 0 0 0 0 1 0 0 0 0 0 0 1 0 0 0 0 1 0 0 1 0 0 0
MASKS
MASK A 0 0 0 0 1 1 1 1 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0
MASK B 1 1 1 1 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 1 1 1 1
MASK C 0 0 0 0 0 0 0 0 1 1 1 1 1 1 1 1 0 0 0 0 0 0 0 0
MASK D 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 1 1 1 1 0 0 0 0

As shown in Table 1, the bit vector may contain flag values for resources 0-17. Furthermore, each mask corresponding to a target processor (e.g., processors A, B, C, and D) contains logical ‘one’ values and logical ‘zero’ values. If a logical AND operation is performed between any mask and the central bit vector of Table 1, a resulting vector will contain values for any flags associated with the logical ‘ones’ of the mask. More clearly, if a processor initiative flag is set for processor B (211), processor B may clear the initiative flag (205), and perform a logical AND operation using its associated mask (207). Based on example Table 1, a logical AND operation between mask B and the central bit vector results in a vector containing a logical ‘one’ value for resource ‘14’. Thus, resource 14 is associated with processor B and thus, processor B has determined that resource ‘14’ requires processing. Furthermore, according to at least one example embodiment, upon processing a request for a resource, the target processor may save the current bit position of the resultant vector to implement fairness among the resources assigned to it.

Processor B may retrieve information from the resource control block (208) associated with resource ‘14’ to determine the action being requested. Once processor B completes processing the request, it may use a compare and swap operation to clear the bit associated with resource ‘14’ in the bit vector (206). Further, because an entry has been processed, the IO processor initiative flag (205) will be set again (e.g., to pass initiative to a processor), and the process is repeated again.

It is noted that according to the above description, particular target processors are associated with particular resources according to binary values included within a binary mask. Accordingly, it is plausible that if a particular processor is inoperable or disabled, the remaining target processors may not process all resources due to lack of binary values for the resources associated with the inactive processor. Therefore, according to at least one example embodiment, in the event a target processor becomes or is inactive, a supervisory agent or recovery task may reassign the resources through modification of the remaining binary masks. Thereafter, associated processor initiative flags may be set to ensure the resources are handled correctly. It is noted that this approach does not necessitate modification of the central bit vector.

It is further noted that embodiments of the invention may be embodied in the form of computer-implemented processes and apparatuses for practicing those processes. Therefore, according to an exemplary embodiment, the methodologies described hereinbefore may be implemented by a computer system or apparatus. For example, FIG. 6 illustrates a computer apparatus, according to an exemplary embodiment. Therefore, portions or the entirety of the methodologies described herein may be executed as instructions in a processor 602 of the computer system 600. The computer system 600 includes memory 601 for storage of instructions and information, input device(s) 603 for computer communication, and display device 604. Thus, the present invention may be implemented, in software, for example, as any suitable computer program on a computer system somewhat similar to computer system 600. For example, a program in accordance with the present invention may be a computer program product causing a computer to execute the example methods described herein.

The computer program product may include a computer-readable medium having computer program logic or code portions embodied thereon for enabling a processor (e.g., 602) of a computer apparatus (e.g., 600) to perform one or more functions in accordance with one or more of the example methodologies described above. The computer program logic may thus cause the processor to perform one or more of the example methodologies, or one or more functions of a given methodology described herein.

The computer-readable storage medium may be a built-in medium installed inside a computer main body or removable medium arranged so that it can be separated from the computer main body. Examples of the built-in medium include, but are not limited to, rewriteable non-volatile memories, such as RAMs, ROMs, flash memories, and hard disks. Examples of a removable medium may include, but are not limited to, optical storage media such as CD-ROMs and DVDs; magneto-optical storage media such as MOs; magnetism storage media such as floppy disks (trademark), cassette tapes, and removable hard disks; media with a built-in rewriteable non-volatile memory such as memory cards; and media with a built-in ROM, such as ROM cassettes.

Further, such programs, when recorded on computer-readable storage media, may be readily stored and distributed. The storage medium, as it is read by a computer, may enable the method(s) disclosed herein, in accordance with an exemplary embodiment of the present invention.

With example embodiments of the present invention having thus been described, it will be obvious that the same may be varied in many ways. The description of the invention hereinbefore uses these examples, including the best mode, to enable any person skilled in the art to practice the invention, including making and using any devices or systems and performing any incorporated methods. The patentable scope of the invention is defined by the claims, and may include other examples that occur to those skilled in the art. Such other examples are intended to be within the scope of the claims if they have structural elements that do not differ from the literal language of the claims, or if they include equivalent structural elements with insubstantial differences from the literal languages of the claims. Such variations are not to be regarded as a departure from the spirit and scope of the present invention, and all such modifications are intended to be included within the scope of the present invention as stated in the following claims.

Verdibello, Jr., Ambrose A., Houston, John S., Helmer, Jr., Leonard W.

Patent Priority Assignee Title
Patent Priority Assignee Title
3643227,
4993014, May 30 1989 AT&T Bell Laboratories Dynamic shared facility system for private networks
5170472, Mar 28 1991 INTERNATIONAL BUSINESS MACHINES CORPORATION, A CORP OF NEW YORK Dynamically changing a system I/O configuration definition
5339413, Aug 21 1992 International Business Machines Corporation Data stream protocol for multimedia data streaming data processing system
5343867, Jun 12 1991 RAVI SHANKAR Method and apparatus for detecting the onset and relative degree of atherosclerosis in humans
5388266, Mar 30 1992 International Business Machines Corporation; INTERNATIONAL BUSINESS MACHINES CORPORATION A CORP OF NEW YORK Management of data objects used intain state information for shared data at a local complex
5452443, Oct 14 1991 Mitsubishi Denki Kabushiki Kaisha Multi-processor system with fault detection
5524212, Apr 27 1992 Board of Regents of the University of Washington Multiprocessor system with write generate method for updating cache
5764641, Sep 08 1995 Cisco Technology, Inc Early and integrated tail packet discard system
5777987, Dec 29 1995 AVAGO TECHNOLOGIES GENERAL IP SINGAPORE PTE LTD Method and apparatus for using multiple FIFOs to improve flow control and routing in a communications receiver
6073181, Jun 03 1997 International Business Machines Corporation Multi-buffer error detection for an open data-link interface LAN adapter
6181677, Feb 18 1998 RACAL-DATACOM, INC Method and apparatus for detection and protection against data loss in a fractional T1/E1 communications environment
6185629, Mar 08 1994 Texas Instruments Incorporated Data transfer controller employing differing memory interface protocols dependent upon external input at predetermined time
6289386, May 11 1998 AVAGO TECHNOLOGIES INTERNATIONAL SALES PTE LIMITED Implementation of a divide algorithm for buffer credit calculation in a high speed serial channel
6363457, Feb 08 1999 TWITTER, INC Method and system for non-disruptive addition and deletion of logical devices
6483804, Mar 01 1999 Oracle America, Inc Method and apparatus for dynamic packet batching with a high performance network interface
6507567, Apr 09 1999 Telefonaktiebolaget LM Ericsson Efficient handling of connections in a mobile communications network
6741552, Feb 12 1998 DEVELCON ELECTRONICS LTD ; PMC-SIERRA INTERNATIONAL, INC Fault-tolerant, highly-scalable cell switching architecture
6862609, Mar 07 2001 CA, INC Redundant storage for multiple processors in a ring network
6993032, Jun 29 2000 Intel Corp Buffer arrangements to support differential link distances at full bandwidth
7093024, Sep 27 2001 International Business Machines Corporation End node partitioning using virtualization
7200704, Apr 07 2005 International Business Machines Corporation Virtualization of an I/O adapter port using enablement and activation functions
7283473, Apr 10 2003 GOOGLE LLC Apparatus, system and method for providing multiple logical channel adapters within a single physical channel adapter in a system area network
7290077, Apr 07 2005 International Business Machines Corporation Event queue structure and method
7366813, Apr 07 2005 International Business Machines Corporation Event queue in a logical partition
7444641, Mar 10 1998 AVAGO TECHNOLOGIES INTERNATIONAL SALES PTE LIMITED Context controller having context-specific event selection mechanism and processor employing the same
7467402, Aug 24 2004 BLACK DUCK SOFTWARE, INC Automated login session extender for use in security analysis systems
7602774, Jul 11 2005 Oracle International Corporation Quality of service for server applications
7613183, Oct 31 2000 AVAGO TECHNOLOGIES INTERNATIONAL SALES PTE LIMITED System and method for router data aggregation and delivery
20010014954,
20010030943,
20020091826,
20020107903,
20020194245,
20030005039,
20030018828,
20030061379,
20040123068,
20040154007,
20040202189,
20040221070,
20050018669,
20050060445,
20050080933,
20050120237,
20050144313,
20060048214,
20060176167,
20060230185,
20060230209,
20060230219,
20070239963,
20070245050,
20080028116,
20080109891,
20080196041,
20090019312,
20090094603,
20090217238,
////
Executed onAssignorAssigneeConveyanceFrameReelDoc
Mar 28 2008International Business Machines Corporation(assignment on the face of the patent)
Mar 29 2008HOUSTON, JOHN S International Business Machines CorporationASSIGNMENT OF ASSIGNORS INTEREST SEE DOCUMENT FOR DETAILS 0210330487 pdf
Mar 31 2008VERDIBELLO, AMBROSE A , JR International Business Machines CorporationASSIGNMENT OF ASSIGNORS INTEREST SEE DOCUMENT FOR DETAILS 0210330487 pdf
Apr 01 2008HELMER, LEONARD W , JR International Business Machines CorporationASSIGNMENT OF ASSIGNORS INTEREST SEE DOCUMENT FOR DETAILS 0210330487 pdf
Date Maintenance Fee Events
Oct 15 2016M1551: Payment of Maintenance Fee, 4th Year, Large Entity.
Dec 14 2020REM: Maintenance Fee Reminder Mailed.
May 31 2021EXP: Patent Expired for Failure to Pay Maintenance Fees.


Date Maintenance Schedule
Apr 23 20164 years fee payment window open
Oct 23 20166 months grace period start (w surcharge)
Apr 23 2017patent expiry (for year 4)
Apr 23 20192 years to revive unintentionally abandoned end. (for year 4)
Apr 23 20208 years fee payment window open
Oct 23 20206 months grace period start (w surcharge)
Apr 23 2021patent expiry (for year 8)
Apr 23 20232 years to revive unintentionally abandoned end. (for year 8)
Apr 23 202412 years fee payment window open
Oct 23 20246 months grace period start (w surcharge)
Apr 23 2025patent expiry (for year 12)
Apr 23 20272 years to revive unintentionally abandoned end. (for year 12)